BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//program.why2025.org//why2025//QV8XVW
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-why2025-ULJAZR@program.why2025.org
DTSTART;TZID=CET:20250809T100000
DTEND;TZID=CET:20250809T130000
DESCRIPTION:As a technical person\, you work with complicated and often imp
 ortant matters. Public speaking is essential to get your message across\, 
 be heard\, and be valued. In this workshop\, you will improve your public 
 speaking skills. The workshop is based on the methods of Toastmasters Inte
 rnational.
DTSTAMP:20250731T184749Z
LOCATION:Workshop Euclid
SUMMARY:Public speaking for technical people - Peter van Eijk
URL:https://program.why2025.org/why2025/talk/ULJAZR/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-why2025-BVSMJZ@program.why2025.org
DTSTART;TZID=CET:20250810T220000
DTEND;TZID=CET:20250810T225000
DESCRIPTION:Zero Trust (ZT) is a security paradigm gaining traction and pop
 ularity.\nIn the talk I will show how ZT is the progression of many securi
 ty ideas that you may already be familiar with\, and how you can rebrand a
 nd review what you are already doing to show that you are making progress.
DTSTAMP:20250731T184749Z
LOCATION:Brachium
SUMMARY:How to bluff your way into Zero Trust - Peter van Eijk
URL:https://program.why2025.org/why2025/talk/BVSMJZ/
END:VEVENT
BEGIN:VEVENT
UID:pretalx-why2025-PRV9UP@program.why2025.org
DTSTART;TZID=CET:20250811T200000
DTEND;TZID=CET:20250811T202500
DESCRIPTION:This talk will enable you to lead architecture conversations an
 d discuss their security options through an informal diagramming technique
 . I will use examples such as key/encryption architectures\, DevOps\, and 
 even your home music system.
DTSTAMP:20250731T184749Z
LOCATION:Cassiopeia
SUMMARY:Using deployment diagrams to explain architecture and security to e
 verybody - Peter van Eijk
URL:https://program.why2025.org/why2025/talk/PRV9UP/
END:VEVENT
END:VCALENDAR
